Updated FY15 Dignity Health General Compliance Education for Staff Module 2

Size: px
Start display at page:

Download "Updated FY15 Dignity Health General Compliance Education for Staff Module 2"

Transcription

1 Updated FY15 Dignity Health General Compliance Education for Staff Module 2 This course will provide you with important information about the laws and regulations that affect the healthcare industry, our organization and you. Course Objectives Upon completion of this course, you should be able to understand and describe: Understand what data elements make up PHI Patient s rights under HIPAA Appropriate use of the Dignity Health network Appropriate use of Social Media Your disclosure and reporting obligations 2 1

2 Health Insurance Portability and Accountability Act (HIPAA) 3 HIPAA Regulations The Health Insurance Portability & Accountability Act (HIPAA) is managed by the Office of Civil Rights (OCR) Health Insurance Portability & Accountability Act HIPAA regulations include controls for the use and disclosure of Protected Health Information (PHI). Use: when PHI is used internally for Treatment, Payment or other Healthcare Operations (audits, training, customer service, internal analysis, etc.). Disclosure: to release or provide access to a patient s PHI to someone like a physician, an attorney, insurance company, etc., outside of Dignity Health. 4 2

3 Protected Health Information (PHI) HIPAA regulations include controls for the use and disclosure of PHI. PHI comes in many forms and does not need to include the patient s name to be considered PHI: Paper records of all types Labels on patient care items Photos and graphics Electronic & computer based records Biomedical equipment Portable storage media Video recordings Verbal communications 5 Patient s Rights under HIPAA All Patients have a right to: Inspect and/or get a copy of their medical record Request a restriction on disclosure of their PHI. An Accounting of Disclosures Patients at any time can ask us to provide them with a list of everyone we have released their health records to, for a period of 6 years. Request an alternative means of communication. Request an amendment to their PHI. All inpatients have the right to Opt Out of the facility directory 6 3

4 Notice of Privacy Practices Dignity Health must provide a Notice of Privacy Practices (NPP) to patients at the time of their visit to the facility. The NPP explains: How we use and disclose PHI What we do to protect privacy Patients rights with regard to privacy Who to contact to file a complaint 7 Treatment, Payment and Operations (TPO) A patient s written authorization is required for most uses or disclosures of PHI except for Treatment, Payment and healthcare Operations (TPO). Treatment: Disclosing necessary information to other providers who are involved in treating the patient. Payment: Disclosing necessary information to health plans, insurers, or others for the payment of health care provided to the patient. Operations: Use of health information for quality improvement, care management, patient satisfaction studies, accreditation, and education. 8 4

5 Minimum Necessary HIPAA s Privacy Rule requires that you make a reasonable effort to limit the use, disclosure or release of PHI to only the Minimum Necessary amount of data that is necessary to accomplish the intended purpose. Only share PHI with authorized individuals who have a need to know. Dignity Health workforce members must apply Minimum Necessary standards when PHI must be disclosed to someone outside of Dignity Health. (for example, an attorney, contractor, business associate, auditor, etc.) Reference Policy Minimum Necessary Standards 9 Patient s Family and Friends You may disclose PHI to members of the patient s family, friends, or any other person identified by the patient as being involved in their care or payment, if the patient has agreed to the disclosure. Disclose only PHI that is directly relevant to the involvement of the family member or friend. Use professional judgment about disclosing PHI in an emergency or if patient is unable to express agreement. You may disclose a patient s location, general condition, or death in order to notify, identify or locate a family member or personal representative of the patient. Reference Policy Patient s Friends and Family 10 5

6 HITECH Act Effective January 1, 2009 the HITECH Act is the privacy and data security component of the American Recovery and Rehabilitation Act (ARRA) Health Information Technology for Economic and Clinical Health HITECH applies HIPAA standards and penalties to Business Associates. Increases penalties for HIPAA Violations Maximum penalty per violation increases from $100 per violation to $50,000 maximum. The cap on penalties for all similar violations increased from $100,000 to $1,500,000. Makes individuals subject to penalties. 11 HITECH Impact to the Individual Healthcare Worker Doctor and Two Employees Plead Guilty to HIPAA Violation Little Rock The United States Attorney's Office, issued a press release providing details of the guilty pleas by a physician and two hospital employees for HIPAA violations. Each pled to a violation of HIPAA based on their accessing a patient s record without any legitimate purpose. Ex UCLA Healthcare Employee Sentenced to Federal Prison for Illegally Peeking at Patient Records Los Angeles A former UCLA Healthcare System employee, who admitted to illegally reading confidential medical records, mostly celebrities and other high profile patients, was sentenced to four months in federal prison. 6

7 Safeguarding PHI & Sensitive Information Protecting patient privacy and confidential information means practicing some basic safeguards in your work area. Do not leave documents with PHI or confidential information unattended on fax machines, printers or copiers. Never allow removal of PHI or other confidential information from the facility without authorization and appropriate security measures. Store portable media that contains PHI or Confidential information in a locked drawer or cabinet. 13 Safeguarding Faxes and U.S. Mail Misdirected faxes are the #1 reported privacy incident across Dignity Health. Everyone must use a Dignity Health fax coversheet when faxing PHI or other confidential information. Always verify the recipient s fax number before sending (including preprogrammed number). Report any misdirected fax or U.S. mail to your local FCP. Reference Policy Safeguarding PHI and Sensitive Information 14 7

8 Safe Disposal of PHI and Confidential Information PHI must be kept confidential even when it is thrown away. Paper records with PHI should be shredded or disposed of in a manner that the PHI can not be read or reconstructed (shredded or put in a locked shredder bin). Pill bottles or patient care items with labels that contain patient information should be destroyed and never put in a recycle bin or garbage can. Electronic media (CDs, DVDs, backup tapes, etc.) that contain PHI or confidential information must be cleared, overwritten or destroyed so that the information can not be retrieved. 15 Data Security 16 8

9 Data Security Dignity Health is required to monitor and detect any potential privacy or data security breach, including regularly monitoring user network activity. Attempts to bypass or override any privacy or data security safeguards to access PHI is a violation of Dignity Health s policies. It is the responsibility of all Dignity Health network users to safeguard and protect ephi. Information is a valuable Dignity Health asset. 17 Network Usage Policy (NUP) Dignity Health Network access is a privilege that is granted to users to assist with the performance of Dignity Health business. User responsibilities are covered in the Network Usage Policy ( ) that every network user must read and sign. Dignity Health regularly monitors user activity. The contents and history of a user s network activity are Dignity Health s property. Any content a user creates or receives via the network is not private nor personal. 18 9

10 Inappropriate Access & Snooping PHI may not be accessed without a legitimate business purpose. In order to ensure compliance with regulations, Dignity Health requires employees to follow the same authorization procedures as patients. It is a violation of Dignity Health policy to use your network access to review your own medical record, PHI of a family member or other individual without the proper authorization. Inappropriate access of PHI will result in disciplinary action per HR policy Protecting PHI is everyone s job. PHI is not everyone s business. Being Snoopy Can Get You In The Doghouse SNOOPY Policy and Sending Secure Any PHI or confidential information sent outside of the Dignity Health network requires encryption. Insert a space after the subject, then type #secure# (lower case). If a message is sent without the #secure# tag it will not be encrypted and this may be a reportable incident. You may use the Send Secure button if available in your Outlook version

11 SharePoint SharePoint sites are a great tool for sharing information, but are not authorized for posting, sharing, or storing documents with PHI or sensitive information. If it is discovered that a document with PHI or sensitive information is posted in a SharePoint site, the site administrator should: Contact the individual user who posted the document and/or their supervisor to alert them that PHI or sensitive documents should not be posted. Site administrator should promptly notify the Facility Compliance Professional. 21 What Should You Do? Dr. Aragon wants to access work information stored on the Dignity Health network from his home, using a laptop provided and supported by Dignity Health. Which of the following is a safe way to work remotely? (click on a response below) A. Copy the information to a thumb/flash drive. B. Use a Virtual Private Network (VPN) or other secure application that is approved by Dignity Health. C. You should never access the Dignity Health network remotely

12 Incorrect Response This is not the best choice. Click button to return to question and try again. 23 Correct Answer B. Use a Virtual Private Network (VPN) or other secure application that is approved by Dignity Health. VPN or other secure method provided by Dignity Health IT should always be used. Bringing data home on portable devices (like thumb drive) or in other physical form can be quite risky. A secure remote access system is the most secure way to access sensitive work data at home. Click button to continue 24 12

13 Portable Devices and Social Media Portable Device & Media Security Policy Electronic information is portable and ephi can be compromised by lost or stolen laptops, cell phones, CDs, thumb drives, etc. Only Dignity Health approved smart phones and tablets may be used to access the Dignity Health network. Limit the storage of PHI or other sensitive information on portable computers and media to the minimum necessary to perform the required tasks. When PHI or confidential information is stored on a laptop or other portable media, maintain a record, mirror copy or backup on the Network. Use appropriate safeguards when using, transporting or storing laptops or removable media

14 Removable Media Encryption Password protection is NOT the same as encryption! You are responsible to ensure all PHI or sensitive data on removable media like memory sticks, CDs or DVDs is properly encrypted and stored in safe location. Never save PHI or Sensitive Information to a hard drive or removable media that is not properly encrypted. Do NOT use the encryption software to encrypt devices like cell phones, cameras, music players or memory cards as they may be damaged or rendered unusable and/or unrecoverable. 27 Personal Cell Phone Use The use of personal cell phones or other camera equipped devices must comply with the Network Usage Policy ( ). The scope of this Policy includes smart phones, pagers, tablets and any handheld device. All employees, physicians, and contractors are responsible for following policies and procedures to restrict the creating of or use of unauthorized digital images with a cell phone or other camera capable device

15 Texting ephi and Image Transmission PHI sent via unsecured texting represents both a privacy and data security incident that may require patient notification and reporting to regulatory agencies. Images sent via text leave a copy of the image on the server of the cellular carrier (i.e. AT & T, Verizon, etc.), the sender s cell phone, and the recipient s cell phone indefinitely. Cell phone and data carriers are not business associates of Dignity Health and have no authorization to receive confidential data, and have no obligation to keep messages confidential. 29 Lost or Stolen Portable Media Call the IT Help Desk immediately to report the theft or loss of CD, flash drive, laptop or other portable device that contains PHI or sensitive information. Call the IT Help Desk immediately to report theft or loss of your tablet or smart phone that you use to connect to the network. The IT Security Team can send a wipe command to clear the memory on the device. Do not cancel phone service with your provider before notifying the IT Help Desk because the wipe command cannot be sent

16 Social Media Guidelines All employees are expected to conduct themselves in a manner that reflects integrity, as well as shows respect and concern for others, including the use of Social Media. Never post confidential information or photo of a patient on the internet, even if it does not include a patient s name. Never discuss confidential information in public forums, chat room, text message or news group. Inappropriate posts of confidential information or photos can seriously damage Dignity Health s reputation, and result in individual liability for the responsible person(s). Think about the consequences that may result from your communications. 31 The Reality of Social Networks Level 1 Krystal (1 person) Krystal posts information about a patient she treated in the ED on her Facebook page and how interesting the case was. Level 2 Krystal s Friends (153 friends) 153 friends Penny Austin Debbie Daryl Bill Lisa Rita Level 3 Krystal s Friends Friends (26,928 people) Average 176 friends x Krystal s 153 friends = 26,928 people Penny s 237 Friends Austin s 124 Friends Debbie s 130 Friends Daryl s 305 Friends Bill s 176 Friends Lisa s 423 Friends Rita s 203 Friends 26,928 people Level 4 Their Friends Friends (Over 4.7 million people) Average 176 friends x 28,928 people = 4,739,328 people Penny s Friends 41,475 friends Austin s Friends 14,200 friends Debbie s Friends 22,750 friends Daryl s Friends 53,375 friends Bill s Friends 17,500 friends Lisa s Friends 34,200 friends One person s post grows exponentially based on friending. Rita s Friends 64,525 friends 4.7 million people 32 16

17 Reporting and Investigations 33 Reporting Systems It is the right and responsibility of every member of Dignity Health s workforce to immediately report any known or suspected violations of laws and regulations, the Standards of Conduct, Dignity Health policies and procedures and any unethical or other improper acts. If corrective action is called for, Dignity Health will make appropriate corrections. All reports are taken seriously, reviewed and investigated promptly and employees are provided the option of anonymous reporting. In some instances, the facility must report breaches to the Department of Health and Human Services (HHS) and notify the individuals affected. Dignity Health will not permit retaliation against any employee who reports his or her concerns in good faith

18 Reporting Systems (cont d) Dignity Health has maintained a Disclosure Program (Hotline) pre dating the CIA and it is required by the CIA. Per the CIA, any report must be recorded in a disclosure log within 48 hours of receipt and shall include a summary of the report, the status of the respective internal review, and any corrective action taken. You should report known or suspected violations of the law, policies or procedures to: Your immediate supervisor / manager Facility Compliance Professional (FCP) Facility IT Site Director Human Resources (for HR related issues) Dignity Health Hotline (anonymous and confidential): Privacy.office@dignityhealth.org (for privacy and data security incidents) 35 Privacy Considerations for California 18

19 California Privacy Laws Effective January 1, 2009, California Health & Safety Code (SB541) impacts all Dignity Health facilities. Prohibits unauthorized viewing, use or disclosure of medical records without direct need for diagnosis, treatment or other lawful use. Requires healthcare organizations to prevent, detect, and investigate unlawful or unauthorized access, use or disclosure of patient medical information. Requires that breaches be reported to the California Department of Public Health (CDPH) and affected patient(s) within 5 business days of discovery. The alleged violator s name is required as part of reporting. Authorizes penalties: $25,000 per patient up to $250,000 $100 per day for failure to report. 37 California Privacy Laws Health & Safety Code (AB211) impacts both Healthcare providers & individuals. Provides private right of action for patients to seek damages as a result of privacy incidents. Places liability directly on the individual who knowingly, willfully or negligently obtains, discloses or uses medical information inappropriately with penalties from $2,500 to $250,000 per violation

20 Thank You If you have any questions, please contact your local Service Area Compliance Director or Facility Compliance Professional. This completes module 2. You will now take the module test

Information Privacy and Security

Information Privacy and Security Information Privacy and Security 2015 Purpose of HIPAA HIPAA stands for the Health Insurance Portability and Accountability Act. Its purpose is to establish nationwide protection of patient confidentiality,

More information

HIPAA Training

HIPAA Training 2011-2012 HIPAA Training New Hire Orientation and General Training 1 This training is to ensure all Health Management workforce members (associates, contracted individuals, volunteers and students) understand

More information

The Privacy & Security of Protected Health Information

The Privacy & Security of Protected Health Information The Privacy & Security of Protected Health Information By the end of this course, you should: Be familiar with the patient s rights to privacy under HIPAA Privacy Act Be able to identify Protected Health

More information

MCCP Online Orientation

MCCP Online Orientation 1 Objectives At the conclusion of this presentation, students will be able to: Discuss application of HIPAA to student s role. Describe the federal requirements of the HIPAA/HITECH regulations that protect

More information

Privacy and Security For Teammates

Privacy and Security For Teammates Privacy and Security For Teammates This self-directed learning module contains information all CRHS Teammates are expected to know in order to protect our patients, our guests, and ourselves. Target Audience:

More information

Advanced HIPAA Communications and University Relations

Advanced HIPAA Communications and University Relations Advanced HIPAA Communications and University Relations accepts no liability of any use reliance placed on it, as it is warranty, express, or implied, or completeness of 1 the HIPAA Health Insurance Portability

More information

HIPAA and HITECH: Privacy and Security of Protected Health Information

HIPAA and HITECH: Privacy and Security of Protected Health Information HIPAA and HITECH: Privacy and Security of Protected Health Information What is HIPAA? Health Insurance Portability and Accountability Act of 1996 A federal law enacted to: Protect the privacy of a patient

More information

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996

What is HIPAA? Purpose. Health Insurance Portability and Accountability Act of 1996 Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,

More information

East Carolina University 2010 Annual HIPAA Privacy Training

East Carolina University 2010 Annual HIPAA Privacy Training East Carolina University 2010 Annual HIPAA Privacy Training What are the HIPAA Privacy and Security Rules? Federal laws that govern the use and disclosure of health information of our patients and research

More information

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook

Breach Reporting and Safeguarding PHI Outpatient Services August, UAMS HIPAA Office Anita Westbrook Breach Reporting and Safeguarding PHI Outpatient Services August, 2012 UAMS HIPAA Office Anita Westbrook Breaches and Breach Reporting Real Life Example An employee of a large hospital accidentally left

More information

Chapter 9 Legal Aspects of Health Information Management

Chapter 9 Legal Aspects of Health Information Management Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.

More information

HIPAA Privacy & Security Training

HIPAA Privacy & Security Training HIPAA Privacy & Security Training for Nonclinicians Introduction As a Duke Medicine workforce member you may have access to patients and patient information and you have a legal and ethical obligation

More information

HIPAA Privacy & Security Training

HIPAA Privacy & Security Training HIPAA Privacy & Security Training for Clinicians Introduction As a clinician at Duke Medicine, you have direct access to patients and patient information and a legal and ethical obligation to protect patient

More information

Title: HIPAA PRIVACY ADMINISTRATIVE

Title: HIPAA PRIVACY ADMINISTRATIVE Administrative-HIPAA Privacy Title: HIPAA PRIVACY ADMINISTRATIVE Scope: All MultiCare Health System (MHS) workforce members, which includes but not limited to, employees, residents, students, volunteers

More information

HIPAA Health Insurance Portability and Accountability Act of 1996

HIPAA Health Insurance Portability and Accountability Act of 1996 HIPAA Health Insurance Portability and Accountability Act of 1996 Protected Health Information (PHI) Covers patient information in any form written, verbal, or electronic PHI Includes Any information that

More information

Your Role in Protecting Patient Privacy 2018

Your Role in Protecting Patient Privacy 2018 Your Role in Protecting Patient Privacy 2018 1 Training Focus This training will focus on what responsibilities you have in order to ensure that both you and our organization are in compliance with state

More information

HIPAA Education Program

HIPAA Education Program HIPAA Education Program 2017-2018 Assurance and Compliance Services HIPAA Training Requirement This HIPAA Training Program is intended for and will satisfy the training requirement for the: Mount Sinai

More information

2018 Employee HIPAA Orientation (EHO) Handbook

2018 Employee HIPAA Orientation (EHO) Handbook 2018 Employee HIPAA Orientation (EHO) Handbook Using EHO The material in this booklet is designed to provide newly hired employees with an understanding of HIPAA s regulations and their impact on the employee

More information

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders

Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders Williamson County EMS (WCEMS) HIPAA Training for Third Out Riders Training Statement: This training program is designed to educate you on WCEMS legal requirements to protect our patients rights and confidentiality,

More information

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director

AUDIT DEPARTMENT UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE. For the period October 2008 through May JEREMIAH P. CARROLL II, CPA Audit Director UNIVERSITY MEDICAL CENTER HIPAA COMPLIANCE For the period October 2008 through May 2009 JEREMIAH P. CARROLL II, CPA Audit Director Audit Department 500 S Grand Central Pkwy Ste 5006 PO Box 551120 Las Vegas

More information

Compliance Program, Code of Conduct, and HIPAA

Compliance Program, Code of Conduct, and HIPAA Compliance Program, Code of Conduct, and HIPAA Agenda Introduction to Compliance The Compliance Program Code of Conduct Reporting Concerns HIPAA Why have a Compliance Program Procedures to follow applicable

More information

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow.

It defines basic terms and lists basic principles that all LSUHSC-NO faculty, staff, residents and students must understand and follow. Office of Compliance Programs Revised: July 18, 2017 HIPAA Privacy HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA) requires that the University train all

More information

HIPAA Privacy Training for Non-Clinical Workforce

HIPAA Privacy Training for Non-Clinical Workforce Office of Compliance Programs HIPAA Privacy Training for Non-Clinical Workforce Revised: January 24, 2017 HIPAA Privacy Workforce Training The Health Insurance Portability & Accountability Act (HIPAA)

More information

New Employee Orientation HIPAA Privacy. Marcia Matthias, MJ, RHIA, CHPC Corporate Director, Health Information/Privacy Officer

New Employee Orientation HIPAA Privacy. Marcia Matthias, MJ, RHIA, CHPC Corporate Director, Health Information/Privacy Officer New Employee Orientation HIPAA Privacy Marcia Matthias, MJ, RHIA, CHPC Corporate Director, Health Information/Privacy Officer Definitions HIPAA Health Insurance Portability and Accountability Act PHI Protected

More information

PRIVACY POLICIES AND PROCEDURES

PRIVACY POLICIES AND PROCEDURES Vinay M. Reddy, M.D., Ethelynda Jaojoco, M.D. Karen D. Cain, PA-C Julie J. Stackhouse, PA-C Jacie Touart, PA-C Brian Vaccarezza, PA-C Physical Medicine & Rehabilitation Electrodiagnostic Medicine Disorders

More information

Valley Regional Medical Center HIPAA AND HITECH EDUCATION

Valley Regional Medical Center HIPAA AND HITECH EDUCATION Valley Regional Medical Center HIPAA AND HITECH EDUCATION Privacy and Security of Protected Health Information 1 HIPAA and Its Purpose What is HIPAA? Health Insurance Portability and Accountability Act

More information

CLINICIAN S GUIDE TO HIPAA PRIVACY

CLINICIAN S GUIDE TO HIPAA PRIVACY CLINICIAN S GUIDE TO HIPAA PRIVACY Introduction... 2 What is HIPAA?... 2 Health Information Privacy... 2 Protected Health Information... 3 Identifiers... 3 HIPAA s Impact on Clinical Practice, Treatment,

More information

A general review of HIPAA standards and privacy practices 2016

A general review of HIPAA standards and privacy practices 2016 A general review of HIPAA standards and privacy practices 2016 45 CFR, 164 Health Insurance Portability and Accountability Act Treatment, Payment and Healthcare Operations 42 CFR, Part 2, Confidentiality

More information

Health Information Privacy Policies and Procedures

Health Information Privacy Policies and Procedures University of the Pacific Arthur A. Dugoni School of Dentistry Health Information Privacy Policies and s These Health Information Privacy Policies & s implement our obligations to protect the privacy of

More information

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office

The University of Toledo. Corporate Compliance and HIPAA Training. Presented by: The Compliance and Privacy Office The University of Toledo Corporate Compliance and HIPAA Training Presented by: The Compliance and Privacy Office Topics Compliance HIPAA (Health Insurance Portability and Accountability Act) FERPA( Family

More information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

Study Management PP STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information PP-501.00 SOP For Safeguarding Protected Health Information Effective date of version: 01 April 2012 Study Management PP 501.00 STANDARD OPERATING PROCEDURE FOR Safeguarding Protected Health Information

More information

HIPAA PRIVACY TRAINING

HIPAA PRIVACY TRAINING HIPAA PRIVACY TRAINING HIPAA Privacy Training Objective Present a general overview of HIPAA and define important terms Understand the purpose of HIPAA and the Privacy Rule Understand the term Protected

More information

Privacy and Security Compliance: The. Date Presenter Name of Member Organization

Privacy and Security Compliance: The. Date Presenter Name of Member Organization Privacy and Security Compliance: The Basics Date Presenter Name of Member Organization Privacy and Security Compliance: The Context for What We Do Privacy and Security compliance within (your office) is

More information

A PHIPA Update from the IPC

A PHIPA Update from the IPC A PHIPA Update from the IPC April 10, 2017 Brian Beamish Commissioner Information and Privacy Commissioner of Ontario PHIPA Processes Internal review of PHIPA processes led to some changes o Most significant:

More information

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA

What is your start date? (Date in which you plan to begin seeing patients in the hospital). Specialty SECTION I. IDENTIFICATION DATA This Application is for Non-employed Clinical Assistants (RN, dental assistant, orthotist, etc) who wish to assist a supervising physician at one or more of our facilities. Advanced Practice Nurses (CRNA,

More information

Student Orientation: HIPAA Health Insurance Portability & Accountability Act

Student Orientation: HIPAA Health Insurance Portability & Accountability Act _ Student Orientation: HIPAA Health Insurance Portability & Accountability Act HIPAA: National Privacy Law History of HIPAA What was once an ethical responsibility to protect a patient s privacy is now

More information

I. PURPOSE DEFINITIONS. Page 1 of 5

I. PURPOSE DEFINITIONS. Page 1 of 5 Policy Title: Computer, E-mail and Mobile Computing Device Use Accreditation Reference: Effective Date: October 15, 2014 Review Date: Supercedes: Policy Number: 4.31 Pages: 1.5.9 Attachments: October 15,

More information

Health Insurance Portability and Accountability Act (HIPAA)

Health Insurance Portability and Accountability Act (HIPAA) HIPPA Review Health Insurance Portability and Accountability Act (HIPAA) What is HIPAA: Stands for Health Insurance Portability and Accountability Act Addresses three areas: 1. Insurance portability 2.

More information

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA

FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA FEDERAL AND STATE BREACH NOTIFICATION LAWS FOR CALIFORNIA LEGAL CITATION California Civil Code Section 1798.82 California Health and Safety (H&S) Code Section 1280.15 42 U.S.C. Section 17932; 45 C.F.R.

More information

HIPAA Privacy and Security Training for Researchers

HIPAA Privacy and Security Training for Researchers HIPAA Privacy and Security Training for Researchers Version April 2017 Mountain States Health Alliance Bringing Loving Care to Health Care 1 Course Objectives This learning course covers HIPAA, HITECH,

More information

Compliance with Personal Health Information Protection Act

Compliance with Personal Health Information Protection Act Compliance with Personal Health Information Protection Act Ontario s Personal Health Information & Protection Act (PHIPA) governs the collection, use and disclosure of personal health information by midwives

More information

Notice of Privacy Practices

Notice of Privacy Practices River Valley Chiropractic LLC Notice of Privacy Practices Effective 9/2014; Revised 9/2014 If you have any questions about this notice, please contact the River Valley Chiropractic Privacy Officer at 308-534-5840.

More information

Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook

Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook HIPAA and Social Media and other PHI Safeguards Presented by the UAMS HIPAA Office August 2013 Anita B. Westbrook Social Networking Let s Talk Facebook More than 750 million users Average user has 130

More information

PERSONALLY IDENTIFIABLE INFORMATON (PII)

PERSONALLY IDENTIFIABLE INFORMATON (PII) PERSONALLY IDENTIFIABLE INFORMATON (PII) 1 PII - REFERENCES DOD 5400.11-R, DoD Privacy Act Program, May 07 OSD Memo, Subj: Safeguarding Against and Responding to the Breach of Personally Identifiable Information,

More information

Compliance & Privacy For Teammates

Compliance & Privacy For Teammates Carolinas HealthCare System 2014 Annual Continuing Education Module Compliance & Privacy For Teammates This self-directed learning module contains information all Carolinas HealthCare System Teammates

More information

VHA Privacy Policy Training FY VHA Privacy Office

VHA Privacy Policy Training FY VHA Privacy Office VHA Privacy Policy Training Applicable Confidentiality Statutes and Regulations The following legal provisions govern the collection, use, maintenance, and disclosure of information from VHA records. The

More information

CHI Mercy Health. Definitions

CHI Mercy Health. Definitions CHI Mercy Health Definitions If you have any questions about this notice, please contact the CHI Mercy Health s Privacy Office at (701) 845-6540 or 570 Chautauqua Blvd, Valley City ND 58072. Notice of

More information

Protecting PHI for Clinical Staff and Students

Protecting PHI for Clinical Staff and Students Office of Compliance Programs Protecting PHI for Clinical Staff and Students Revised: July 24, 2017 Introduction HIPAA requires that LSUHSC-NO "have in place appropriate administrative, technical, and

More information

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers

Health Insurance Portability and Accountability Act. Awareness Training for Volunteers Health Insurance Portability and Accountability Act Awareness Training for Volunteers Southeastern Health Southeastern Health has a strong tradition of protecting the privacy of patient information. Confidentiality

More information

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance

HIPAA. Health Insurance Portability and Accountability Act. Presented by the UMMC Office of Integrity and Compliance HIPAA Health Insurance Portability and Accountability Act Presented by the UMMC Office of Integrity and Compliance Rules and Regulations to ensure Privacy Set Federally recognized standards to ensure both

More information

Emergency Medical Services Division Policies Procedures Protocols

Emergency Medical Services Division Policies Procedures Protocols Emergency Medical Services Division Policies Procedures Protocols Patient Medical Record Security and Privacy Policies and Procedures (1003.00) I. GENERAL PROVISIONS: A. The intent of these policies and

More information

HIPAA 201: Student Self-Learning Module & Test

HIPAA 201: Student Self-Learning Module & Test HIPAA 201: Student Self-Learning Module & Test Information: This self-learning module meets the HIPAA 201 competency for Students. This requirement must be met once (it is not an annual requirement). Instructions:

More information

Yale University. HIPAA PRIVACY FAQs

Yale University. HIPAA PRIVACY FAQs HIPAA PRIVACY FAQs Table of Contents I. PRIVACY FUNDAMENTALS I- 4 WHAT IS HIPAA? WHAT IS HITECH? WHO NEEDS TO ABIDE BY HIPAA? ARE THERE PENALTIES FOR NOT COMPLYING? WHAT IS PHI? WHAT IDENTIFIES AN INDIVIDUAL?

More information

ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY

ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY ENTERPRISE INCOME VERIFICATION (EIV) SECURITY POLICY Rev. October 2011 EIV Security Policy Acknowledgment Form By signing this form I acknowledge my receipt of the EIV System Security Policy approved by

More information

HIPAA THE PRIVACY RULE

HIPAA THE PRIVACY RULE HIPAA THE PRIVACY RULE Reviewed December 2012 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of antidepressant medications in their mail. 2 HISTORY Many

More information

CENTRAL TEXAS MEDICAL CENTER

CENTRAL TEXAS MEDICAL CENTER CENTRAL TEXAS MEDICAL CENTER Date: To: Physician Office Staff Personnel or Billing Agents From: Jan Knott, CMSCICPCS Re: Security Registration In order to register you through the CTMC security system

More information

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

WHAT IS HIPAA? HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004 Rev. 1/22/2010 HIPAA TRAINING WHAT IS HIPAA? Health Insurance Portability and Accountability Act HIPAA is the ELECTRONIC transmission of Three programs have been enacted to date Privacy Rule April 2004

More information

Compliance & Privacy For Teammates

Compliance & Privacy For Teammates Carolinas HealthCare System 2015 Annual Continuing Education Module Compliance & Privacy For Teammates This self-directed learning module contains information all Carolinas HealthCare System Teammates

More information

Methodist Le Bonheur Healthcare Corporate Compliance and HIPAA New Associate Training

Methodist Le Bonheur Healthcare Corporate Compliance and HIPAA New Associate Training Methodist Le Bonheur Healthcare Corporate Compliance and HIPAA New Associate Training All new Methodist Le Bonheur Healthcare (MLH) Associates must complete this compliance training. It includes information

More information

DO ASK BUT DON T TELL HIPAA PRIVACY RULE

DO ASK BUT DON T TELL HIPAA PRIVACY RULE DO ASK BUT DON T TELL HIPAA PRIVACY RULE HITECH/OMNIBUS FINAL RULE HIPAA enacted in 1996; compliance required April 14, 2003 for the Privacy Rule and April 21, 2005 for the Security Rule surrounding electronic

More information

HIPAA Privacy Rule. Best PHI Privacy Practices

HIPAA Privacy Rule. Best PHI Privacy Practices HIPAA Privacy Rule Best PHI Privacy Practices Learning Objectives Define the acronym HIPAA. Understand your role and responsibilities under the privacy regulations. Know what patient s rights are in terms

More information

FCSRMC 2017 HIPAA PRESENTATION

FCSRMC 2017 HIPAA PRESENTATION FCSRMC 2017 HIPAA PRESENTATION BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of BDO International Limited, a UK company limited by guarantee, and forms part of the international

More information

Privacy and Security Orientation for Visiting Observers. DUHS Compliance Office

Privacy and Security Orientation for Visiting Observers. DUHS Compliance Office Privacy and Security Orientation for Visiting Observers DUHS Compliance Office 919-668-2573 compliance@dm.duke.edu Introduction This orientation is to provide new Visiting Observers with the HIPAA Privacy

More information

Parental Consent For Minors to Receive Services

Parental Consent For Minors to Receive Services Parental Consent For Minors to Receive Services Welcome to the University of San Diego s Wellness Area! We appreciate your coming our way, and look forward to working with you. The following provides important

More information

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File

REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust. Signed Administrative Approval On File The Alexandra Hospital, Ingersoll PRIVACY POLICY SUBJECT-TITLE Privacy Policy REVIEWED BY Leadership & Privacy Officer Medical Staff Board of Trust DATE Oct 11, 2005 Nov 8, 2005 POLICY CODE DATE OF ORIGIN

More information

Technology Standards of Practice

Technology Standards of Practice 2016 Technology Standards of Practice Used with permission from the Association of Social Work Boards (2016) Table of Contents Technology Standards of Practice 2 Definitions 2 Section 1 Practitioner Competence

More information

Compliance Program Updated August 2017

Compliance Program Updated August 2017 Compliance Program Updated August 2017 Table of Contents Section I. Purpose of the Compliance Program... 3 Section II. Elements of an Effective Compliance Program... 4 A. Written Policies and Procedures...

More information

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA?

HIPAA PRIVACY DIRECTIONS. HIPAA Privacy/Security Personal Privacy. What is HIPAA? DIRECTIONS HIPAA Privacy/Security Personal Privacy 1. Read through entire online training presentation 2. Close the presentation and click on Online Trainings on the Intranet home page 3. Click on the

More information

Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation

Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation Healthcare Privacy Officer on Evaluating Breach Incidents A look at tools and processes for monitoring compliance and preserving your reputation June 20, 2012 ID Experts Webinar www.idexpertscorp.com Mahmood

More information

CODE OF CONDUCT (Regarding Legal and Ethical Conduct) PERFORMED BY: All Staff

CODE OF CONDUCT (Regarding Legal and Ethical Conduct) PERFORMED BY: All Staff P O L I C Y PROCEDURE STANDARD OF CARE STANDARDIZED PROCEDURE GUIDELINE OTHER APPROVAL DATE January 2017 TITLE: MANUAL: Center Policy TRACKING # CPM 12-21 CODE OF CONDUCT (Regarding Legal and Ethical Conduct)

More information

Section: Medical Staff Office Page: 1 of 2

Section: Medical Staff Office Page: 1 of 2 Section: Medical Staff Office Page: 1 of 2 Subject: Job Shadowers and Observers Not Covered Under Clinical Affiliation Agreement Executive Owner: Chief Medical Officer Original Policy: 6/4/13 Current Effective

More information

I. POLICY: DEFINITIONS:

I. POLICY: DEFINITIONS: GEORGIA DEPARTMENT OF JUVENILE JUSTICE Applicability: {x} All DJJ Staff {x} Administration {x} Community Services {x} Secure Facilities (RYDCs and YDCs) Chapter 5: RECORDS MANAGEMENT Subject: HEALTH RECORDS

More information

Reporting a Privacy Breach to the Commissioner

Reporting a Privacy Breach to the Commissioner SEPTEMBER 2017 Reporting a Privacy Breach to the Commissioner GUIDELINES FOR THE HEALTH SECTOR To strengthen the privacy protection of personal health information, the Ontario government has amended the

More information

Chapter 19 Section 3. Privacy And Security Of Protected Health Information (PHI)

Chapter 19 Section 3. Privacy And Security Of Protected Health Information (PHI) Health Insurance Portability and Accountability Act (HIPAA) of 1996 Chapter 19 Section 3 1.0 BACKGROUND AND APPLICABILITY 1.1 The contractor shall comply with the provisions of the Health Insurance Portability

More information

Safeguarding PHI Nutrition Services. UAMS HIPAA Office May 2015

Safeguarding PHI Nutrition Services. UAMS HIPAA Office May 2015 Safeguarding PHI Nutrition Services UAMS HIPAA Office May 2015 HIPAA (not HIPPA) What is HIPAA? The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security

More information

System Office New Hire Orientation

System Office New Hire Orientation System Office New Hire Orientation Integrity & Compliance Program Jennifer Munro, MA 2, CHC Manager, Integrity & Compliance Education, Communication & Hotline System Integrity & Audit Services munrojl@trinity-health.org

More information

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES

INFORMATION TECHNOLOGY, MOBILES DIGITAL MEDIA POLICY AND PROCEDURES INFORMATION TECHNOLOGY, MOBILES AND DIGITAL MEDIA POLICY AND PROCEDURES Updates Who Updated Comments Aug annually Lewis External version TABLE OF CONTENTS AIMS AND LEGISLATION... 3 MOBILE PHONES PARENTS/CARERS

More information

Compliance Program And Code of Conduct. United Regional Health Care System

Compliance Program And Code of Conduct. United Regional Health Care System Compliance Program And Code of Conduct United Regional Health Care System TABLE OF CONTENTS Page MESSAGE FROM OUR PRESIDENT... 1 COMPLIANCE PROGRAM... 2 Program Structure...2 Management s Responsibilities

More information

WRAPPING YOUR HEAD AROUND HIPAA PRIVACY REQUIREMENTS

WRAPPING YOUR HEAD AROUND HIPAA PRIVACY REQUIREMENTS WRAPPING YOUR HEAD AROUND HIPAA PRIVACY REQUIREMENTS Jeffrey Staton Attorney at Law Legal Aid Society of Louisville 416 W. Muhammad Ali Blvd., Ste. 300 Louisville, KY 40202 Phone: 502.614.3146 Jstaton@laslou.org

More information

2018 HCCA Compliance Institute HIPAA Update: Policy & Enforcement. Policy Update: Marissa Gordon-Nguyen HHS OCR Senior Advisor

2018 HCCA Compliance Institute HIPAA Update: Policy & Enforcement. Policy Update: Marissa Gordon-Nguyen HHS OCR Senior Advisor 2018 HCCA Compliance Institute HIPAA Update: Policy & Enforcement Policy Update: Marissa Gordon-Nguyen HHS OCR Senior Advisor 2 1 OCR Responds to Nation s Opioid Crisis Opioid abuse crisis and national

More information

The Impact of New Technology in Health Care on Privacy

The Impact of New Technology in Health Care on Privacy The Impact of New Technology in Health Care on Privacy Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario Ontario College of Social Workers and Social Service Workers June 18, 2008 Presentation

More information

GDPR Records Management Policy

GDPR Records Management Policy GDPR Records Management Policy Last updated: April 2018 0 Contents: Statement of intent 1. Legal framework 2. Responsibilities 3. Benefits of a retention policy 4. Retention of pupil records and other

More information

General Compliance Training: Fourth Reporting Period

General Compliance Training: Fourth Reporting Period General Compliance Training: Fourth Reporting Period 2017-18 1 Hi, I am Mona Thompson, Vice President and Chief Compliance Officer. I thank you for participating in the Fourth Reporting Period General

More information

COMPLIANCE PROGRAM. Our commitment to ethical conduct and compliance depends on all employees having a clear understanding of Corporate expectations.

COMPLIANCE PROGRAM. Our commitment to ethical conduct and compliance depends on all employees having a clear understanding of Corporate expectations. COMPLIANCE PROGRAM Our commitment to ethical conduct and compliance depends on all employees having a clear understanding of Corporate expectations. SpecialCare Hospital Management Corporation s Commitment

More information

Alignment. Alignment Healthcare

Alignment. Alignment Healthcare Alignment CODE OF CONDUCT Alignment Healthcare Our commitment to ethical conduct and compliance depends on all Alignment Healthcare personnel. If you find yourself in an ethical dilemma or suspect inappropriate

More information

POTENTIAL LIABILITY: PATIENT HEALTH INFORMATION PORTALS

POTENTIAL LIABILITY: PATIENT HEALTH INFORMATION PORTALS POTENTIAL LIABILITY: PATIENT HEALTH INFORMATION PORTALS Jeanne M. Born, RN, JD 22 JANUARY 2015 Jborn@nexsenpruet.com Medical Record Information: Ownership and Patient Rights The physician owns the physician

More information

PRIVACY BREACH MANAGEMENT POLICY

PRIVACY BREACH MANAGEMENT POLICY \(.kon Education Education PRIVACY BREACH MANAGEMENT POLICY Effective Date: September 1, 2016 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (A TIPP Act) public bodies

More information

AGENDA. 10:45 a.m. CT Attendees Sign On 11:00 a.m. CT Webinar 11:50 a.m. CT Questions and Answers

AGENDA. 10:45 a.m. CT Attendees Sign On 11:00 a.m. CT Webinar 11:50 a.m. CT Questions and Answers AGENDA 10:45 a.m. CT Attendees Sign On 11:00 a.m. CT Webinar 11:50 a.m. CT Questions and Answers Asking Questions Throughout the webinar, type your questions using the "send note" button at the top of

More information

Security Risk Analysis

Security Risk Analysis Security Risk Analysis Risk analysis and risk management may be performed by reviewing and answering the following questions and keeping this review (with date and signature) for evidence of this analysis.

More information

Health Information Exchange 101. Your Introduction to HIE and It s Relevance to Senior Living

Health Information Exchange 101. Your Introduction to HIE and It s Relevance to Senior Living Health Information Exchange 101 Your Introduction to HIE and It s Relevance to Senior Living Objectives for Today Provide an introduction to Health Information Exchange Define a Health Information Exchange

More information

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, Ph.D. COMMISSIONER INFORMATION AND PRIVACY COMMISSIONER OF ONTARIO Table of Contents What is a privacy breach?...1

More information

Protecting Health Information: Health Data Security Training

Protecting Health Information: Health Data Security Training Protecting Health Information: Health Data Security Training How to secure patient information and manage your obligations under HIPAA, the HITECH Act and other federal and state data privacy and security

More information

Compliance & Privacy Post Test

Compliance & Privacy Post Test Compliance & Privacy Post Test 1. One of your family members recently had a procedure at the CHS facility where you work. You want to find out the results. What should you do? a. Use your access rights

More information

Piedmont Healthcare, Inc. Code of Conduct

Piedmont Healthcare, Inc. Code of Conduct Piedmont Healthcare, Inc. Code of Conduct You are part of the Piedmont Healthcare family, a group of talented and dedicated people who take pride in what you do and are committed to our patients and our

More information

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN):

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN): Information and Privacy Commissioner / Ontario Report of the Information & Privacy Commissioner/Ontario Review of the Cardiac Care Network of Ontario (CCN): A Prescribed Person under the Personal Health

More information

HIPAA Policies and Procedures Manual

HIPAA Policies and Procedures Manual UNIVERSITY of NORTH CAROLINA at CHAPEL HILL SCHOOL of NURSING HIPAA Policies and Procedures Manual November 2015 1 Table of Contents I. INTRODUCTION... 3 A. GENERAL POLICY... 3 B. SCOPE... 3 II. DEFINITIONS...

More information

USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY

USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY Page Number 1 of 8 TITLE: PURPOSE: USES AND DISCLOSURES OF PROTECTED HEALTH INFORMATION: HIPAA PRIVACY POLICY To assure that individually identifiable health information contained in any University Health

More information

Please Turn Off or Silence Cell Phones & Pagers

Please Turn Off or Silence Cell Phones & Pagers Please Turn Off or Silence Cell Phones & Pagers 1 Compliance at UAMS Presented by: Office of Hospital Compliance Office of Research Compliance Faculty Group Practice Compliance HIPAA Office 2 UAMS Compliance

More information

Protecting Patient Privacy It s Everyone s Responsibility

Protecting Patient Privacy It s Everyone s Responsibility 1 of 27 Protecting Patient Privacy It s Everyone s Responsibility This presentation is comprised of 27 screens. When you have finished reading a screen, click your mouse to continue to the next screen.

More information

2514 Stenson Dr Cedar Park TX Fax

2514 Stenson Dr Cedar Park TX Fax HIPAA QUESTIONS LESSON 2 1. Civil monetary penalties can be as high as: a. $100 b. $1,000 c. $10,000 d. $50,000 2. Civil penalties for HIPAA violations apply to: a. Covered entities b. Business associates

More information